Endpoint Detection – Your antivirus won’t catch everything

Does your organization have best practices for how to use technology which include installing patches, computer based training and pushing out anti-virus updates? Does your firm have a threat detection strategy? Perhaps your firm utilizes a layered security approach and because you have never experienced a breach you are at peace with the security of…Continue Reading


laptop screen with verification code on screen

5 Tips to Prevent Phishing Scams from Infecting Your Business

Phishing scams are making the news again. This time a very believable scam targets Google users. If you think you know everything about protecting yourself, be aware that many tech savvy users were duped on this one. Here’s how they did it and how you can protect your business and employees. What is a Phishing…Continue Reading


hooded figure in background with computer code and lock on screen

10 Ways to Secure Your Data and Prevent Hacking

Let’s face it, our lives are online nowadays. Whether it’s business information, bank accounts, bill pay, our car, our smart house, or any number of activities we complete online, just being on the Interwebs makes us all vulnerable to hacking. But there are ways you can avoid getting hacked, and whether you’re “techy” or not,…Continue Reading


person sitting at desk on phone looking at computer screen with virus warning

Stay Protected: What You Need to Know About Viruses, Phishing and Spam

Viruses, phishing scams, and spam are annoying on your personal computer. They can tap into your contacts, siphon off important information from bank accounts and credit card numbers, and be downright embarrassing when “you” email everyone you know about discount sunglasses or a bank account in the West Indies. But annoying quickly turns to catastrophe…Continue Reading


learn-how-to-identify-tech-support-scams

Learn How To Identify Tech Support Scams

If there’s one thing that’s been proven in the tech world, it’s that scammers will stop at nothing to deceive and manipulate innocent computer users. One of the more recent scams comes from an unexpected source: the telephone. Learn to recognize suspicious scamming behavior so that you can protect your resources. Scamming: What and Why?…Continue Reading